Open-source flow monitoring with SENSOR: Benefits and trade-offs

Flow monitoring tools are useful for tracking traffic patterns, planning capacity, and spotting threats. But many off-the-shelf solutions come with steep licensing costs and hardware demands, especially if you want to process every packet. A research t… Continue reading Open-source flow monitoring with SENSOR: Benefits and trade-offs

AWS CISO explains how cloud-native security scales with your business

In this Help Net Security interview, Amy Herzog, CISO at AWS, discusses how cloud-native security enables scalable, flexible protection that aligns with how teams build in the cloud. She explains the Shared Responsibility Model and the tools and proces… Continue reading AWS CISO explains how cloud-native security scales with your business

APT groups are getting personal, and CISOs should be concerned

Instead of focusing only on corporate systems, some APT groups are now going after executives in their personal lives. Home networks, private devices, and even family members have become targets. This approach works because executives often work remote… Continue reading APT groups are getting personal, and CISOs should be concerned

From legacy to SaaS: Why complexity is the enemy of enterprise security

In this Help Net Security interview, Robert Buljevic, Technology Consultant at Bridge IT, discusses how the coexistence of legacy systems and SaaS applications is changing the way organizations approach security. He explains why finding the right balan… Continue reading From legacy to SaaS: Why complexity is the enemy of enterprise security

Review: From Day Zero to Zero Day

From Day Zero to Zero Day is a practical guide for cybersecurity pros who want to move beyond reading about vulnerabilities and start finding them. It gives a methodical look at how real vulnerability research is done. About the author Eugene Lim is a … Continue reading Review: From Day Zero to Zero Day

Beyond PQC: Building adaptive security programs for the unknown

In this Help Net Security interview, Jordan Avnaim, CISO at Entrust, discusses how to communicate the quantum computing threat to executive teams using a risk-based approach. He explains why post-quantum cryptography (PQC) is an urgent and long-term pr… Continue reading Beyond PQC: Building adaptive security programs for the unknown

Security tooling pitfalls for small teams: Cost, complexity, and low ROI

In this Help Net Security interview, Aayush Choudhury, CEO at Scrut Automation, discusses why many security tools built for large enterprises don’t work well for leaner, cloud-native teams. He explains how simplicity, integration, and automation are ke… Continue reading Security tooling pitfalls for small teams: Cost, complexity, and low ROI

AIBOMs are the new SBOMs: The missing link in AI risk management

In this Help Net Security interview, Marc Frankel, CEO at Manifest Cyber, discusses how overlooked AI-specific risks, like poisoned training data and shadow AI, can lead to security issues that conventional tools fail to detect. He explains how AI Bill… Continue reading AIBOMs are the new SBOMs: The missing link in AI risk management

Smart steps to keep your AI future-ready

In this Help Net Security interview, Rohan Sen, Principal, Cyber, Data, and Tech Risk, PwC US, discusses how organizations can design autonomous AI agents with strong governance from day one. As AI becomes more embedded in business ecosystems, overlook… Continue reading Smart steps to keep your AI future-ready

Review: CISA Certified Information Systems Auditor Practice Tests

CISA Certified Information Systems Auditor Practice Tests offers practical, domain-by-domain prep for the CISA exam, with hundreds of questions covering key objectives and real-world systems audit skills. About the authors Peter H. Gregory is a best-se… Continue reading Review: CISA Certified Information Systems Auditor Practice Tests